Skip to main content

The term “physical attacks” has two quite different meanings in the field of IT security. The first one describes mechanisms to physically penetrating a rather large perimeter, e.g., overcoming an access control system for a server room. The related techniques, for instance picking locks and bridging fences, are outside the scope of the Encyclopedia. Technologies used for perimeter security involve, for instance, intrusion detection sensors and alarm systems.

In the context of cryptographic implementations, “physical attack” is understood as a term which encompasses all attacks based on physical means against cryptographic devices. Physical attacks are of relevance if an adversary gains physical access to the cryptographic device or its near-by environment, e.g., a smart card.

There are two different objectives which have to be regarded in order to counter physical attacks. The first one aims to prevent the disclosure and/or modification of the internal data (e.g., cryptographic keys...

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

References

  1. ISO 13491-1 (1998). Banking—Secure cryptographic devices (retail), Part 1: Concepts, requirements and evaluation methods (1st ed.).

    Google Scholar 

  2. FIPS PUB 140-2 (2002). “Security requirements for cryptographic modules.” National Institut of Standards and Technology, available at http://csrc.nist.gov/cryptval/

  3. BSI-PP-0002. “Smartcard IC platform protection profile, v1.0.” Available at http://www.bsi.bund.de/cc/pplist/ssvgpp01.pdf

  4. PP/9806. Smartcard integrated circuit protection profile v2.0.” Available at http://www.ssi.gouv.fr/site_documents/PP/PP9806.pdf, http://www.nlectc.org/perimetr/full2.htm

Download references

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 International Federation for Information Processing

About this entry

Cite this entry

Lemke, K., Paar, C. (2005). Physical Attacks. In: van Tilborg, H.C.A. (eds) Encyclopedia of Cryptography and Security. Springer, Boston, MA . https://doi.org/10.1007/0-387-23483-7_300

Download citation

Publish with us

Policies and ethics